Attack

Results: 9771



#Item
841Secure communication / Security / Cyberwarfare / Computing / Electronic voting in Estonia / Electronic voting / Computer network security / Cryptographic protocols / Denial-of-service attack / Voting system / Server / Absentee ballot

Security Analysis of the Estonian Internet Voting System Drew Springall† Travis Finkenauer† Zakir Durumeric† Jason Kitcat‡ Harri Hursti Margaret MacAlpine J. Alex Halderman† † University of Michigan, Ann Arb

Add to Reading List

Source URL: aaspring.com

Language: English - Date: 2015-01-16 19:16:47
842

BHATT MURPHY SOLICITORS PRESS RELEASE 19 MayFOR IMMEDIATE RELEASE) MET APOLOGISES TO VICTIM OF RACE ATTACK

Add to Reading List

Source URL: www.bhattmurphy.co.uk

Language: English - Date: 2015-05-19 06:43:56
    843

    Institut Mines-Télécom Multi-Level Formal Analysis A New Direction for Fault Injection Attack?

    Add to Reading List

    Source URL: www.proofs-workshop.org

    Language: English
      844Cryptography / Stream ciphers / Advanced Encryption Standard / Differential fault analysis / Block cipher / VEST / Data Encryption Standard / Fault model / Fault injection / Side-channel attack / Common Scrambling Algorithm

      IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, SPECIAL ISSUE, VOL. 6, NO. 1, DECEMBERA Combined Design-Time/Test-Time Study of the Vulnerability of Sub-Threshold Devices to

      Add to Reading List

      Source URL: euler.ecs.umass.edu

      Language: English - Date: 2014-03-28 15:45:17
      845Security / Computer security / Access control / Computer access control / Role-based access control / Role hierarchy / PERMIS / Object Process Methodology / Database security / Metamodeling / Inference attack

      Monitoring Database Access Constraints with an RBAC Metamodel: a Feasibility Study Lars Hamann, Karsten Sohr, and Martin Gogolla University of Bremen, Computer Science Department DBremen, Germany {lhamann,sohr,gog

      Add to Reading List

      Source URL: www.db.informatik.uni-bremen.de

      Language: English - Date: 2014-12-06 08:06:31
      846

      Security Analysis of rSTS Type Multivariate Public Key Cryptosystems against Algebraic Attack Using Gröbner Bases May 28, 2010 Recent Results Session The Third International Workshop on

      Add to Reading List

      Source URL: pqc2010.cased.de

      Language: English - Date: 2010-06-10 08:19:24
        847

        37 Under Attack and Above Scrutiny? Arms and Ammunition Diversion from Peacekeepers in Sudan and

        Add to Reading List

        Source URL: hsba.smallarmssurvey.org

        Language: English - Date: 2015-07-07 10:50:17
          848

          Volleyball Box Score 2015 Oregon Volleyball UTAH vs #22 Oregon (Oct 03, 2015 at Eugene, Ore.) Attack E TA

          Add to Reading List

          Source URL: www.goducks.com

          Language: English - Date: 2015-10-04 00:12:42
            849

            CBEST/STAR Threat Intelligence Systemically-important financial institutions that form part of the UK’s Critical National Infrastructure need to remain resilient to cyber attack. To help them achieve this, the Bank o

            Add to Reading List

            Source URL: www.digitalshadows.com

            Language: English - Date: 2016-03-04 15:48:27
              UPDATE